Category: Recon

Enumeración de subdominios – Recon parte 2

Subdomain Enumeration – Recon part 2

Inspired by part two of Topics: Set up your VPS server To list subdomains of a target, the easiest way is programmatic automation. First of all we need to have a Linux-based operating system, such as the KaliLinux distribution that can be used as a virtual machine from Vmware in Windows. But

Read More
Wide scope Program – Recon parte 1

Wide scope Program – Recon part 1

A different approach to traditional recognition. When a vulnerability search is carried out for a company, and not enough information is provided, it is difficult to have a map about all the assets that correspond to the company. In this entry you can obtain information on different techniques to locate those targets that are not visible

Read More